Linux installation mariadb and simple configuration

1, installation mariadbInstallation commandsInstall MARIADB Mariadb-serverInstallation Complete mariadb, first start mariadbSystemctl Start mariadbSet boot upSystemctl Enable MARIADBThe following is a simple configuration of

Troubleshooting Linux SSH Login Slow

There are two reasons for SSH logon slow: DNS reverse resolution problem and SSH GSSAPI authentication1: SSH GSSAPI authentication problem Gssapi (Generic Security Services application Programming Interface) is a set of Kerberos-like5Common network

Linux Learning Notes

Blogging thinking: Both theory and practice, trying to know what this thing is, where to use it, when to use it, why to use it, and how to use it next. Learning ability, thinking method.Knowledge System:Foundation (RHCE)RH033RH133RH253RHCA:RH401RH423

Linux operational logical partition and swap partition

Job One:1) Add a 15G SCSI hard disk before opening the Linux system2) Turn on the system, right click on the desktop, open the terminal3) for the newly added hard disk partition, a primary partition size of 5G, the remaining space to the extended

Linux free command

Job Two:1.free Command View memory[[Email protected] Desktop]# freeTotal used free shared buffers Cachedmem:1003432 899760 103672 8228 1028 335564-/+ buffers/cache:563168 440264swap:2097148 0 20971482. Organizing the role of buffer and

The Facl of Linux privileges

Facl of Linux PermissionsIn front of you to share the UGO and mandatory bit and adventure bit, sometimes we take advantage of the previously spoken permission some requirements can not meet, for example, there is a file corresponding to other people'

One of the Find tips-linux commands

1. Want to see the file named "ABC" in the current folder and sub-folder# Find. -name Test. : Represents the current directory-name: Indicates that you want to find by name2. To see if there is a "xyz" directory in the current folder and sub-folder#

Linux Common commands and options

Believe that the use of Linux friends more or less have access to Linux commands it! Linux commands are heavy, and every command has a lot of options, and it's very hard to remember. In fact, as long as the master of a certain way only after that is

Linux Kernel network parameter optimization

Additional content under/ETC/SYSCTL.CNFNet.core.netdev_max_backlog =32768Net.core.somaxconn=32768Net.core.wmem_default=8388608Net.core.rmem_default=8388608Net.core.rmem_max=16777216Net.core.wmem_max=16777216Net.ipv4.ip_local_port_range=1024x768 65000

WDCP Linux Quick Install

WDCP supports two mounting methods1 Source compilation This installation is cumbersome and time-consuming, generally 20 minutes to one hours, depending on the configuration of the Machine 2 RPM package installation is simple and fast, download fast,

Linux kernel Analysis Week fifth job

Analyzing the System_call interrupt processing processThe goal this time is to track the uname system call selected last week through GDB. GDB cannot debug native system calls because system calls are implemented through interrupts in the kernel

Linux file management commands in a detailed

Gentoo LFS (Linux from scratch)Directory ManagementLS, pwd, CD, mkdir, RmDir, treeFile ManagementTouch, CP, MV, RM, file, statTime ManagementDate, clock, Hwclock, CalView textCat, more, less, head, tailCat (TAC reverse order Display): Connect and

Linux Learning Notes

Linux common CommandsIII. Rights Management Commands1. only root and file creator can modify file permissions (chmod). 2. Only root can modify the file's owner and the owning group, and the default creator of the file/directory is its owners and

Windows and Linux do not have access to the Tomcat home issue for Linux in VMware

1. Be sure that your Tomcat server is started. (to ensure that insurance can be re-shutdown,startup once before testing)2. Determine the correct IP address and port number for your visitIf you are external to VMware windows, be sure to ensure that

Basic Authentication for HTTP and httpbasic

Basic Authentication for HTTP and httpbasic Basic Authentication Basic Authentication is an HTTP access control method used to restrict access to website resources. This method does not require cookies and sessions. You only need to submit the

Linux netstat command details, netstat command details

Linux netstat command details, netstat command detailsStatement: reprint Http://www.cnblogs.com/ggjucheng/archive/2012/01/08/2316661.html  Introduction The Netstat command is used to display various network-related information, such as network

Use sudo to prompt that the user is not in the sudoers file. sudosudoers

Use sudo to prompt that the user is not in the sudoers file. sudosudoers Switch to the root user[Linux @ localhost ~] $ Su rootPassword:[Root @ localhost ~] # 2View/etc/sudoers file permissions. If you have read-only permissions, change to

Linux basic command exercise Day3-File Management: cat, tar, gzip, vim, ln, day3-vim

Linux basic command exercise Day3-File Management: cat, tar, gzip, vim, ln, day3-vim 1. File Merging The cat command is used to connect files or standard input and print. This command is often used to display the file content, connect several files,

Linux Command notes (1), linux Command notes

Linux Command notes (1), linux Command notes Gui and command line switch: Graphic Interface: Ctrl + Alt + F7 under vmware: Alt + Shift + Ctrl + F7 Command line interface: Ctrl + Alt + F1 ~ F6 vmware: Alt + Shift + Ctrl + F1 ~ F6 Shortcut Key: Ctrl +

[Tool Avenue] log on to the Linux server through ssh and display the graphical interface, sshlinux

[Tool Avenue] log on to the Linux server through ssh and display the graphical interface, sshlinux Address of this Article Click to follow the Public Account "programmer's cultural sentiments"   Sharing outline: 1. Overview 2. Implement ssh logon

Total Pages: 5467 1 .... 3860 3861 3862 3863 3864 .... 5467 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.